Back to Results
First PageMeta Content
Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector


A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I
Add to Reading List

Document Date: 2015-04-21 05:49:18


Open Document

File Size: 806,30 KB

Share Result on Facebook

City

Delhi / /

Company

online AE / AdvAE AE / underlying AE / AEGIS / ExpAuth AE / /

Country

India / /

Currency

USD / /

/

Event

Man-Made Disaster / /

Facility

Somitra Sanadhya Indraprastha Institute of Information Technology / /

IndustryTerm

probabilistic algorithm / crypto device / software/hardware / limited device / invalid operator / real world applications / decryption algorithm / time symmetric encryption algorithm / low memory devices / authenticated decryption algorithm / seed generation algorithm / limited memory devices / decryption protocol / tag verification algorithm / encryption algorithm / authenticated encryption algorithm / /

Organization

G8 / Memory Constrained Devices Megha Agrawal / Donghoon Chang / and Somitra Sanadhya Indraprastha Institute of Information Technology / IN V / G7 / M AC / /

Person

Ai / /

Position

arbiter / /

Product

CM / Sponge / /

ProgrammingLanguage

C / K / /

Technology

x0 Algorithm / authenticated decryption algorithm / encryption algorithm / Information Technology / block cipher / smart card / secret key / Decrypt-then-mask protocol / 1 Introduction Authenticated encryption / Verification The algorithm / tag verification algorithm / 1.1 Encryption The algorithm / Encryption / authenticated encryption algorithm / proposed algorithm / decryption protocol / Remotely keyed encryption / proposed Authenticated Encryption / Decryption using Decrypt-Then-Mask Protocol / high-bandwidth encryption / decryption algorithm / time symmetric encryption algorithm / seed generation algorithm / 2.2 Decrypt-Then-Mask Protocol / 2 2.1 Previous Work Remotely Keyed Authenticated Encryption / Conceal algorithm / authenticated encryption / stream cipher / /

SocialTag